This Trojan may be downloaded from remote sites by other malware. It may also be dropped by other malware. It may arrive bundled with malware packages as a malware component. It may also be downloaded unknowingly by a user when visiting malicious Web sites.
Upon execution, it creates registry entries to enable its automatic execution at every system startup. It accesses URLs to download malicious files. Trend Micro detects the following files as:
This Trojan then executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. It then deletes itself after execution.
More...